Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Re:How to fix it (Score 1) 127

All the e-readers I've used allow you to choose a different font as well. I have not used a Kindle but it probably has that option somewhere.

So does Kindle. What he's bitching about is that the Kindle supplied font he was using as a workaround for his having bad eyes is no longer usable as a workaround, because the update included a slightly different version of the font, such that it no longer appears to be bolded, as it did previously.

He doesn't want to up the point size on the font, which the Kindle would allow, and which also work around the problem. Presumably, this is an "I'm not old, dammit!" reaction to the use of the larger point size as a workaround.

He doesn't want to use the publisher font (also an option), because the publisher (presumably) picked a font that *also* does not work around his eye problems, either.

Or none of these things, and he's just one of those people who are pissy about wanting to side-load custom fonts, and apply them to his entire library, and this is his wedge issue to allow him to ride that particular hobby horse.

Or not even that, he's just being pissy about the fact modern technology is moving away from accessibility in many ways, and he's using this as a wedge issue because he wants to be able to intermediate presentation to do things like automatically text-to-speech.

Because if he *REALLY* cared about the font, it's a completely work-aroundable problem. All you have to do is DRM-strip the book in question, replace the font in the book image with whatever font you want (which makes it a "publisher font", as far as the Kindle knows), and then set the device to use the "publisher font", and presto, you have whatever damn font you want, without Amazon needing to allow side-loading of pirated fonts. Which is apparently something they are contractually prohibited from doing.

In point of fact, there are many blogs that discuss how to perform the procedure on individual books, such that they are using whatever font you want them to use. I'm partial to this one, since it demonstrates the control panel image on the Kindle as part of the setup process for doing the conversion, and the particular image they used shows that the Helvetica font on the device appears to be bolded, compared to all the other available font selections.

Blog demonstrating replacing the font used by a book on a Kindle:


Comment Re:Microsoft will generally not brick your compute (Score 1) 350

No, there's a security exchange between the CPU and the touch sensor, and by replacing one it needs to have a new exchange only customers and third party repair have not been told how to do this (possibly needing validation with Apple back office servers).

So you're saying the replacement device was /NOT/ identical, because it was incapable of duplicating the crypto exchange.

I'm pretty sure you are saying exactly what the GP said, yet you are disagreeing with them?!?

Comment How to fix it (Score 0, Flamebait) 127

How to fix it:

"Open a book, magazine or other document on the Kindle. Press the “Menu” button on the bottom of the device. The text size options are displayed with the current size underlined. Press the right arrow on the 5-way controller to increase the font size."

There, fixed, unless you are being an ass about how many character there are horizontally and vertically as well.

If you need the "large print edition" of something, quit trying to pretend your are not getting old, or that you eyes are better than they actually are, and give in to the "usability for humans with sub-par ocular hardware" settings, and be done with it.

Comment Re:Damned if you do, damned if you don't (Score 3, Informative) 350

Why should the touch ID sensor need to, or be actually doing, store any data or provide authentication?

Because the encryption key for the device is stored in an NVRAM knapsack in the touch sensor. The CPU uses a public key to establish an encrypted connection via the bus which connects it to the touch sensor, and then sends a block down to decrypt the contents of the knapsack, and then uses that to decrypt the user data key that's stored in the NVRAM attached to the CPU, and then uses that to decrypt the user data.

By forcing a pairing of the touch sensor with the CPU, it means you can not do a two stage attack by topping just one chip, you'd have to top both chips, and if you did that, your half-of-a-key-pair that you obtained wouldn't work with another device.

The way Apple handles this in the repair cases is it just replaces your device guts with completely new device guts (so that your cheesy engraving is not taken away -- and neither are your scratches in non-critical areas), and pops a new sensor chip (with an uninitialized PROM) into the device, and sends those guts to someone else as a refurbish.

But that does mean that third party repair for either of the two components is theoretically possible, but practically speaking, Apple will not sell you the chip you need to replace to do the same repair that an authorized service center would do. On the other hand... it means that Apple won't get the blame if you put in some third party battery or charging circuitry, and burn down your damn house because you wanted to save $5 or whatever.

Comment Microsoft will generally not brick your computer. (Score 1, Insightful) 350

That's not bricking. Bricking would be MS rendering components in the computer or the entire computer unusable.

Microsoft will generally not brick your computer.

They may decide, however, that if you have replaced sufficient components of the computer, that it is not the same computer for which the OS has been licensed, and refuse you the right to run the OS. You're still free, however, to either put some of the old components back so that that's no longer the case, or boot Linux on the thing instead.

In the case of the OP, technically, they've replaced enough components that Apple has decided that it's not the machine for which iOS was licensed to run, which is very similar in scope.

Comment Re:should be interesting (Score 5, Insightful) 323

Maybe he shouldn't have legal issues? Just keep his head down?

That's a fantastic idea! No one should ever make waves, or make things uncomfortable for The Powers That Be(tm)!

Everybody wins! [If they happen to be one of The Powers That Be(tm); otherwise they lose...]

While we are at it, let's put the final nails in the coffin of all investigative, yet inconvenient, reporting!

Also: I want a pony...

Comment Re:Two simple suggestions. (Score 1) 1818

Personally I read at -1, Raw and Uncut because I'm a masochist and often find some funny stuff down in the gutter.

I usually read at +3 or +4, but I give extra +5 score to flamebaits. I started doing it years ago after reading about the idea from somebody else. Those posts are funny/interesting often enough that I haven't reverted it.

Comment Re:It was the first standard for video? (Score 1) 406

And if you don't have at least a dual-monitor setup, you're doing it wrong.

I have a dual-monitor setup at work (one at 1680x1050 and the other at 1440x900 or so, both somewhere near 20") and a single-monitor setup at home (28" 4K). I think the single 4K monitor is more useful than two lower-res monitors, and it takes up less space (as in it still fits on the smaller desk at home).

Comment Re:It was the first standard for video? (Score 1) 406

You're not kidding. Consider this tripe from TFA:

"One of the first computers with built-in video output, the Apple II, simply threw a lot of CPU time at a character generator, a shift register, and a few other bits of supporting circuitry to write memory to a video output."

The Apple II wasted no CPU time on graphics. Memory access was interleaved between the CPU and the video hardware; the video hardware (a bunch of 74LSxx logic, eventually reduced to two chips in the IIe and then one chip in the IIGS) was entirely responsible for drawing the screen contents based on the contents of the frame buffers and some softswitches.

With that error right off the bat, I didn't bother continuing with the article. The author is the Howard Zinn of computer history, if this is an accurate indication of his output.

That this is coming from Hackaday is troubling. Aren't they usually better than this?

Comment Re:The article you reference does not demonstrate (Score 1) 41

Sorry, but the length guide is *not* sufficient.

While it's more specific than sequence homology predicts, it's less specific than the laser focus it's portrayed as having.

I understand the need to portray it as being as close to perfect as possible to preserve funding (and the research *should* be funded!), right now, the best method we have of ensuring that off-target mutations do not occur is via post-sequencing.

See these papers regarding "Dammit, I missed!":

New Sequencing Methods Reveal Off-Target Effects of CRISPR/Cas9

Unbiased detection of off-target cleavage by CRISPR-Cas9 and TALENs using integrase-defective lentiviral vectors

Analysis of off-target effects of CRISPR/Cas-derived RNA-guided endonucleases and nickases

CRISPR-Cas9 Specificity: Taming Off-target Mutagenesis

Digenome-seq: genome-wide profiling of CRISPR-Cas9 off-target effects in human cells

Quantifying on- and off-target genome editing

CRISPR/Cas9 Guide
Salient quote: "The randomness of NHEJ-mediated DSB repair has important practical implications, because a population of cells expressing Cas9 and a gRNA will result in a diverse array of mutations (for more information, jump to Plan Your Experiment). In most cases, NHEJ gives rise to small InDels in the target DNA which result in in-frame amino acid deletions, insertions, or frameshift mutations leading to premature stop codons within the open reading frame (ORF) of the targeted gene. Ideally, the end result is a loss-of-function mutation within the targeted gene; however, the “strength” of the knock-out phenotype for a given mutant cell is ultimately determined by the amount of residual gene function."

P.S.: And you know as well as I do that the 'P' in "CRISPR" stands for "Palindromic".

Comment Perhaps like one of my less technical managers... (Score 1) 165

why didn't you just ask it once? what is the reason for asking it several times? what made you decide to type the same question out with different words? what good is asking the same thing over and over doing?

Perhaps like one of my less technical managers, they felt that by asking the same question a different way, they would get a different answer, since they didn't like the answer the first 11 ways they asked the question, asking it a slightly different way a 12th time would magically change the laws of physics so that they could have the answer they wanted, and I was just being obstructionist by insisting gravity pulls towards the center of mass instead of towards, you know, Cleveland or something.

"Anderson here is our expert in all matters related to the drawing of red lines..."

Slashdot Top Deals

Disc space -- the final frontier!